what does WWW stand for
World Wide Web
what is digital currency
an accepted form of currency to pay for goods an services.
examples of digital currencies are PayPal, Apple pay, and Gopay
define hacking
what is two-step verification
requires two methods of authentication before making a purchase or logging in an account
usually the second method is receiving code via mail or phone
what does URL stand for
Uniform Resource Locator
what is a block chain
decentralized database to store transaction made by networked members
the difference between phishing and pharming
....
what is adware
adware is a type of malware that attempts to flood the user with unwanted ads
two types of cookies
session cookies
persistent[permanent] cookies
name three cyber security threat
>>brute force attacks.
>>data interception
>>distributed denial of service [DDOS] attack
>>hacking
>>malware
>>phishing
>>pharming
>>social engineering
what is SSL certificate
a form of digital certificate to authenticate a website
what does a DDOS[Distributed Denial of Service] attack do
it prevents users to access part of a network
one method to do DDoS attack is by spamming and the spammed messages will be in traffic
what is Hyper transfer protocol [HTTP]
rules when transferring files across the internet
how do hackers do brute force
hacker will try common combination of letters or number until they find the password
such passwords are [12345678] , [asdfghjkl]
what are the 4 biometric technique
>>fingerprint
>>retina scans
>>face recognition
>>voice recognition
what is the four stages when a cybercriminal targets an individual using social engineering
1. gather information and decide method
2. victim is being targeted
3. the cybercriminal will attack the victim
4after the cybercriminals are done they will remove all traces of malware to cover their track
3 Difference between internet and WWW
internet
users can send and receive emails.
allow online chatting[via text, audio ,and video].
make and use of transmission protocols [TCP] and internet protocols [IP].
it is a worldwide collection of interconnected networks and devices.
WWW
it is a collection of multimedia web pages and other information on websites.
uniform resource locators are used to specify the location of the web pages.
web resources are accessed by web browsers.
uses internet to access information from web servers.
name 5 types of malware
>>viruses
>>ransomware
>>adware
>>spyware
>>trojan horse
>>worms
name 5 way to prevent cyber threat
>>anti-malware
>anti-virus
>>authentication
>>passwords and user name
>>biometric
>>two step authentication
>>firewall
what are the 5 social engineering examples
>>instant messaging
>>scareware
>>emails/phishing scams
>>baiting
>>phone calls